CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Critical runC vulnerabilities enable container escape to host system

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Three critical vulnerabilities in runC, a container runtime used by Docker and Kubernetes, could allow attackers to escape container isolation and gain root access to the host system. The flaws, tracked as CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881, were disclosed by SUSE engineer Aleksa Sarai. Exploiting these vulnerabilities requires the ability to start containers with custom mount configurations, which can be achieved through malicious container images or Dockerfiles. The vulnerabilities affect all versions of runC, with fixes available in versions 1.2.8, 1.3.3, 1.4.0-rc.3, and later. No active exploits have been reported, but researchers at Sysdig have provided detection and mitigation strategies.

Timeline

  1. 09.11.2025 17:11 1 articles · 1d ago

    Critical runC vulnerabilities disclosed, enabling container escape to host system

    Three critical vulnerabilities in runC, tracked as CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881, were disclosed by SUSE engineer Aleksa Sarai. These flaws allow attackers to escape container isolation and gain root access to the host system. Exploits require custom mount configurations, which can be achieved through malicious container images or Dockerfiles. Fixes are available in runC versions 1.2.8, 1.3.3, 1.4.0-rc.3, and later. No active exploits have been reported.

    Show sources

Information Snippets